메뉴 건너뛰기




Volumn 38, Issue 3, 2014, Pages 655-678

Differential effects of prior experience on the malware resolution process

Author keywords

Antivirus software; Catastrophe; Economics of information systems; Information security; Information sharing; Knowledge retention; Learning curve; Malware; Targeted attack

Indexed keywords

COMPUTER CRIME; DIGITAL STORAGE; DISASTERS; INFORMATION ANALYSIS; INFORMATION DISSEMINATION; SECURITY OF DATA;

EID: 84944902500     PISSN: 02767783     EISSN: 21629730     Source Type: Journal    
DOI: 10.25300/MISQ/2014/38.3.02     Document Type: Article
Times cited : (18)

References (100)
  • 2
    • 0016355478 scopus 로고
    • A new look at the statistical model identification
    • Akaike, H. 1974. "A New Look at the Statistical Model Identification", IEEE Transactions on Automatic Control (19), pp. 716-723.
    • (1974) IEEE Transactions on Automatic Control , Issue.19 , pp. 716-723
    • Akaike, H.1
  • 3
    • 0001643223 scopus 로고
    • The persistence and transfer of learning in industrial settings
    • Argote, L., Beckman, S. L., and Epple, D. 1990. "The Persistence and Transfer of Learning in Industrial Settings", Management Science (36:2), pp. 140-154.
    • (1990) Management Science , vol.36 , Issue.2 , pp. 140-154
    • Argote, L.1    Beckman, S.L.2    Epple, D.3
  • 4
    • 0025021555 scopus 로고
    • Learning curves in manufacturing
    • Argote, L., and Epple, D. 1990. "Learning Curves in Manufacturing", Science (247:4945), pp. 920-924.
    • (1990) Science , vol.247 , Issue.4945 , pp. 920-924
    • Argote, L.1    Epple, D.2
  • 5
    • 0042218143 scopus 로고    scopus 로고
    • Intraorganizational learning
    • J. Baum ed., Oxford, UK: Wiley-Wiley
    • Argote, L., and Ophir, R. 2005. "Intraorganizational Learning", in The Blackwell Companion to Organizations, J. Baum (ed.), Oxford, UK: Wiley-Wiley, pp. 181-207.
    • (2005) The Blackwell Companion to Organizations , pp. 181-207
    • Argote, L.1    Ophir, R.2
  • 6
    • 33644916146 scopus 로고    scopus 로고
    • Sell first, fix later: Impact of patching on software quality
    • Arora, A., Caulkins, J. P., and Telang, R. 2006. "Sell First, Fix Later: Impact of Patching on Software Quality", Management Science (52:3), pp. 465-471.
    • (2006) Management Science , vol.52 , Issue.3 , pp. 465-471
    • Arora, A.1    Caulkins, J.P.2    Telang, R.3
  • 7
    • 77954250852 scopus 로고    scopus 로고
    • An empirical analysis of software vendors' patch release behavior: Impact of vulnerability disclosure
    • Arora, A., Krishnan, R., Telang, R., and Yang, Y. B. 2010. "An Empirical Analysis of Software Vendors' Patch Release Behavior: Impact of Vulnerability Disclosure", Information Systems Research (21:1), pp. 115-132.
    • (2010) Information Systems Research , vol.21 , Issue.1 , pp. 115-132
    • Arora, A.1    Krishnan, R.2    Telang, R.3    Yang, Y.B.4
  • 8
    • 61849175198 scopus 로고    scopus 로고
    • Optimal policy for software vulnerability disclosure
    • Arora, A., Telang, R., and Xu, H. 2008. "Optimal Policy for Software Vulnerability Disclosure", Management Science (54:4), pp. 642-656.
    • (2008) Management Science , vol.54 , Issue.4 , pp. 642-656
    • Arora, A.1    Telang, R.2    Xu, H.3
  • 9
    • 84944960496 scopus 로고    scopus 로고
    • Best practices: Guidelines to consider in the evaluation of potentially unwanted technologies
    • ASC. 2007. "Best Practices: Guidelines to Consider in the Evaluation of Potentially Unwanted Technologies", Anti-Spyware Coalition (http://www.antispywarecoalition.org/documents/documents/best-practices-final-working-report.pdf)
    • (2007) Anti-spyware Coalition
    • ASC1
  • 11
    • 33750703619 scopus 로고    scopus 로고
    • Network software security and user incentives
    • August, T., and Tunca, T. I. 2006. "Network Software Security and User Incentives", Management Science (52:11), pp. 1703-1720.
    • (2006) Management Science , vol.52 , Issue.11 , pp. 1703-1720
    • August, T.1    Tunca, T.I.2
  • 12
    • 61349202831 scopus 로고    scopus 로고
    • Let the pirates patch? An economic analysis of software security patch restrictions
    • August, T., and Tunca, T. I. 2008. "Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions", Information Systems Research (19:1), pp. 48-70.
    • (2008) Information Systems Research , vol.19 , Issue.1 , pp. 48-70
    • August, T.1    Tunca, T.I.2
  • 13
    • 79956063140 scopus 로고    scopus 로고
    • Who should be responsible for software security? A comparative analysis of liability policies in network environments
    • August, T., and Tunca, T. I. 2011. "Who Should Be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments", Management Science (57:5), pp. 934-959.
    • (2011) Management Science , vol.57 , Issue.5 , pp. 934-959
    • August, T.1    Tunca, T.I.2
  • 14
    • 84944960497 scopus 로고    scopus 로고
    • Fighting epo viruses
    • Bania, P. 2010. "Fighting Epo Viruses", Symantec Connect, (http://www.symantec.com/connect/articles/fighting-epoviruses).
    • (2010) Symantec Connect
    • Bania, P.1
  • 15
    • 0032050741 scopus 로고    scopus 로고
    • Software development practices, software complexity, and software maintenance performance: A field study
    • Banker, R. D., Davis, G. B., and Slaughter, S. A. 1998. "Software Development Practices, Software Complexity, and Software Maintenance Performance: A Field Study", Management Science (44:4), pp. 433-450.
    • (1998) Management Science , vol.44 , Issue.4 , pp. 433-450
    • Banker, R.D.1    Davis, G.B.2    Slaughter, S.A.3
  • 16
    • 0023020183 scopus 로고
    • The moderator mediator variable distinction in social psychological-research: Conceptual, strategic, and statistical considerations
    • Baron, R. M., and Kenny, D. A. 1986. "The Moderator Mediator Variable Distinction in Social Psychological-Research: Conceptual, Strategic, and Statistical Considerations", Journal of Personality and Social Psychology (51:6), pp. 1173-1182.
    • (1986) Journal of Personality and Social Psychology , vol.51 , Issue.6 , pp. 1173-1182
    • Baron, R.M.1    Kenny, D.A.2
  • 17
    • 61349154288 scopus 로고    scopus 로고
    • Aspiration performance and railroads' patterns of learning from train wrecks and crashes
    • Baum, J. A. C., and Dahlin, K. B. 2007. "Aspiration Performance and Railroads' Patterns of Learning from Train Wrecks and Crashes", Organization Science (18:3), pp. 368-385.
    • (2007) Organization Science , vol.18 , Issue.3 , pp. 368-385
    • Baum, J.A.C.1    Dahlin, K.B.2
  • 18
    • 84944960498 scopus 로고    scopus 로고
    • Governments hit by cyber attack
    • July 8
    • BBC. 2009. "Governments Hit by Cyber Attack", BBC News, July 8 (http://news.bbc.co.uk/2/hi/technology/8139821.stm).
    • (2009) BBC News
    • BBC1
  • 19
    • 0001135843 scopus 로고    scopus 로고
    • Learning and forgetting: The dynamics of aircraft production
    • Benkard, C. L. 2000. "Learning and Forgetting: The Dynamics of Aircraft Production", American Economic Review (90:4), pp. 1034-1054.
    • (2000) American Economic Review , vol.90 , Issue.4 , pp. 1034-1054
    • Benkard, C.L.1
  • 20
    • 38549099676 scopus 로고    scopus 로고
    • Learning from experience in software development: A multilevel analysis
    • Boh, W. F., Slaughter, S. A., and Espinosa, J. A. 2007. "Learning from Experience in Software Development: A Multilevel Analysis", Management Science (53:8), pp. 1315-1331.
    • (2007) Management Science , vol.53 , Issue.8 , pp. 1315-1331
    • Boh, W.F.1    Slaughter, S.A.2    Espinosa, J.A.3
  • 21
    • 84901620904 scopus 로고    scopus 로고
    • Virus for hire: Growing number of hackers attack web sites for cash
    • Business Section, November 30
    • Bryan-Low, C. 2004. "Virus for Hire: Growing Number of Hackers Attack Web Sites for Cash", Wall Street Journal, Business Section, November 30, (http://online.wsj.com/article/SB110176932097886077.html).
    • (2004) Wall Street Journal
    • Bryan-Low, C.1
  • 22
    • 7444242205 scopus 로고    scopus 로고
    • The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers
    • Cavusoglu, H., Mishra, B., and Raghunathan, S. 2004. "The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers", International Journal of Electronic Commerce (9:1), pp. 69-104.
    • (2004) International Journal of Electronic Commerce , vol.9 , Issue.1 , pp. 69-104
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 23
    • 18944385964 scopus 로고    scopus 로고
    • The value of intrusion detection systems in information technology security architecture
    • Cavusoglu, H., Mishra, B., and Raghunathan, S. 2005. "The Value of Intrusion Detection Systems in Information Technology Security Architecture", Information Systems Research (16:1), pp. 28-46.
    • (2005) Information Systems Research , vol.16 , Issue.1 , pp. 28-46
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 24
    • 33947376004 scopus 로고    scopus 로고
    • Efficiency of vulnerability disclosure mechanisms to disseminate vulnerability knowledge
    • Cavusoglu, H., and Raghunathan, S. 2007. "Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge", IEEE Transactions on Software Engineering (33:3), pp. 171-185.
    • (2007) IEEE Transactions on Software Engineering , vol.33 , Issue.3 , pp. 171-185
    • Cavusoglu, H.1    Raghunathan, S.2
  • 25
    • 61849135265 scopus 로고    scopus 로고
    • Security patch management: Share the burden or share the damage?
    • Cavusoglu, H., and Zhang, J. 2008. "Security Patch Management: Share the Burden or Share the Damage?", Management Science (54:4), pp. 657-670.
    • (2008) Management Science , vol.54 , Issue.4 , pp. 657-670
    • Cavusoglu, H.1    Zhang, J.2
  • 26
    • 84861381885 scopus 로고    scopus 로고
    • Broadening focus: Spillovers, complementarities, and specialization in the hospital industry
    • Clark, J. R., and Huckman, R. S. 2012. "Broadening Focus: Spillovers, Complementarities, and Specialization in the Hospital Industry", Management Science (58:4), pp. 708-722.
    • (2012) Management Science , vol.58 , Issue.4 , pp. 708-722
    • Clark, J.R.1    Huckman, R.S.2
  • 28
    • 0000323696 scopus 로고
    • The acquisition, transfer, and depreciation of knowledge in service organizations: Productivity in franchises
    • Darr, E. D., Argote, L., and Epple, D. 1995. "The Acquisition, Transfer, and Depreciation of Knowledge in Service Organizations: Productivity in Franchises", Management Science (41:11), pp. 1750-1762.
    • (1995) Management Science , vol.41 , Issue.11 , pp. 1750-1762
    • Darr, E.D.1    Argote, L.2    Epple, D.3
  • 29
    • 84944876793 scopus 로고    scopus 로고
    • The evolution of antivirus software
    • Desai, C. 2007. "The Evolution of Antivirus Software", Network World (24:42), p. 30.
    • (2007) Network World , vol.24 , Issue.42 , pp. 30
    • Desai, C.1
  • 30
    • 0000068350 scopus 로고
    • Treating progress functions as a managerial opportunity
    • Dutton, J. M., and Thomas, A. 1984. "Treating Progress Functions as a Managerial Opportunity", Academy of Management Review (9:2), pp. 235-247.
    • (1984) Academy of Management Review , vol.9 , Issue.2 , pp. 235-247
    • Dutton, J.M.1    Thomas, A.2
  • 32
    • 0005721539 scopus 로고
    • A brief statement of schema theory
    • Evans, S. H. 1967. "A Brief Statement of Schema Theory", Psychonomic Science (8), pp. 87-88.
    • (1967) Psychonomic Science , Issue.8 , pp. 87-88
    • Evans, S.H.1
  • 33
    • 0034478781 scopus 로고    scopus 로고
    • Coordinating expertise in software development teams
    • Faraj, S., and Sproull, L. 2000. "Coordinating Expertise in Software Development Teams", Management Science (46:12), pp. 1554-1568.
    • (2000) Management Science , vol.46 , Issue.12 , pp. 1554-1568
    • Faraj, S.1    Sproull, L.2
  • 34
    • 30344462995 scopus 로고    scopus 로고
    • The economic incentives for sharing security information
    • Gal-Or, E., and Ghose, A. 2005. "The Economic Incentives for Sharing Security Information", Information Systems Research (16:2), pp. 186-208.
    • (2005) Information Systems Research , vol.16 , Issue.2 , pp. 186-208
    • Gal-Or, E.1    Ghose, A.2
  • 35
    • 33747415490 scopus 로고    scopus 로고
    • The volume-outcome effect, scale economies, and learning-by-doing
    • Gaynor, M., Seider, H., and Vogt, W. B. 2005. "The Volume-Outcome Effect, Scale Economies, and Learning-by-Doing", American Economic Review (95:2), pp. 243-247.
    • (2005) American Economic Review , vol.95 , Issue.2 , pp. 243-247
    • Gaynor, M.1    Seider, H.2    Vogt, W.B.3
  • 36
    • 0032209022 scopus 로고    scopus 로고
    • Process innovation and learning by doing in semiconductor manufacturing
    • Hatch, N. W., and Mowery, D. C. 1998. "Process Innovation and Learning by Doing in Semiconductor Manufacturing", Management Science (44:11), pp. 1461-1477.
    • (1998) Management Science , vol.44 , Issue.11 , pp. 1461-1477
    • Hatch, N.W.1    Mowery, D.C.2
  • 38
    • 84944960499 scopus 로고    scopus 로고
    • Targeted attacks 10 times more profitable than mass campaigns
    • Higgins, K. J. 2011. "Targeted Attacks 10 Times More Profitable Than Mass Campaigns", Dark Reading (http://www.darkreading.com/mobile/targeted-attacks-10-times-more-profitabl/231000836).
    • (2011) Dark Reading
    • Higgins, K.J.1
  • 39
    • 80052890770 scopus 로고    scopus 로고
    • The organizational science of disaster/terrorism prevention and response: Theory-building toward the future of the field
    • James, K. 2011. "The Organizational Science of Disaster/Terrorism Prevention and Response: Theory-Building toward the Future of the Field", Journal of Organizational Behavior (32:7), pp. 1013-1032.
    • (2011) Journal of Organizational Behavior , vol.32 , Issue.7 , pp. 1013-1032
    • James, K.1
  • 40
    • 20944441343 scopus 로고    scopus 로고
    • Market for software vulnerabilities? Think again
    • Kannan, K., and Telang, R. 2005. "Market for Software Vulnerabilities? Think Again", Management Science (51:5), pp. 726-740.
    • (2005) Management Science , vol.51 , Issue.5 , pp. 726-740
    • Kannan, K.1    Telang, R.2
  • 42
    • 84868234495 scopus 로고    scopus 로고
    • Accumulating a portfolio of experience: The effect of focal and related experience on surgeon performance
    • KC, D. S., and Staats, B. R. 2012. "Accumulating a Portfolio of Experience: The Effect of Focal and Related Experience on Surgeon Performance", Manufacturing & Service Operations Management (14:4), pp. 618-633.
    • (2012) Manufacturing & Service Operations Management , vol.14 , Issue.4 , pp. 618-633
    • Kc, D.S.1    Staats, B.R.2
  • 43
  • 44
    • 79960144492 scopus 로고    scopus 로고
    • The effect of liability and patch release on software security: The monopoly case
    • Kim, B. C., Chen, P. Y., and Mukhopadhyay, T. 2011. "The Effect of Liability and Patch Release on Software Security: The Monopoly Case", Production and Operations Management (20:4), pp. 603-617.
    • (2011) Production and Operations Management , vol.20 , Issue.4 , pp. 603-617
    • Kim, B.C.1    Chen, P.Y.2    Mukhopadhyay, T.3
  • 46
    • 77049094487 scopus 로고    scopus 로고
    • Organizational learning from extreme performance experience: The impact of success and recovery experience
    • Kim, J. Y., and Miner, A. S. 2009. "Organizational Learning from Extreme Performance Experience: The Impact of Success and Recovery Experience", Organization Science (20:6), pp. 958-978.
    • (2009) Organization Science , vol.20 , Issue.6 , pp. 958-978
    • Kim, J.Y.1    Miner, A.S.2
  • 47
    • 84944895578 scopus 로고    scopus 로고
    • Understanding security knowledge and national culture: A comparative investigation between Korea and the U. S.
    • Kwak, D.-H., Kizzier, D. M., Zo, H., and Jung, E. S. 2011. "Understanding Security Knowledge and National Culture: A Comparative Investigation between Korea and the U. S.", Asia Pacific Journal of Information Systems (21:3), pp. 51-69.
    • (2011) Asia Pacific Journal of Information Systems , vol.21 , Issue.3 , pp. 51-69
    • Kwak, D.-H.1    Kizzier, D.M.2    Zo, H.3    Jung, E.S.4
  • 48
    • 77049091359 scopus 로고    scopus 로고
    • Experiencing the improbable: Rare events and organizational learning
    • Lampel, J., Shamsie, J., and Shapira, Z. 2009. "Experiencing the Improbable: Rare Events and Organizational Learning", Organization Science (20:5), pp. 835-845.
    • (2009) Organization Science , vol.20 , Issue.5 , pp. 835-845
    • Lampel, J.1    Shamsie, J.2    Shapira, Z.3
  • 50
    • 35548965096 scopus 로고    scopus 로고
    • An examination of private intermediaries' roles in software vulnerabilities disclosure
    • Li, P., and Rao, H. R. 2007. "An Examination of Private Intermediaries' Roles in Software Vulnerabilities Disclosure", Information Systems Frontiers (9:5), pp. 531-539.
    • (2007) Information Systems Frontiers , vol.9 , Issue.5 , pp. 531-539
    • Li, P.1    Rao, H.R.2
  • 51
    • 0033253617 scopus 로고    scopus 로고
    • Analogical encoding facilitates knowledge transfer in negotiation
    • Loewenstein, J., Thompson, L., and Gentner, D. 1999. "Analogical Encoding Facilitates Knowledge Transfer in Negotiation", Psychonomic Bulletin & Review (6:4), pp. 586-597.
    • (1999) Psychonomic Bulletin & Review , vol.6 , Issue.4 , pp. 586-597
    • Loewenstein, J.1    Thompson, L.2    Gentner, D.3
  • 52
    • 77049089733 scopus 로고    scopus 로고
    • These lives will not be lost in vain: Organizational learning from disaster in u. S. Coal mining
    • Madsen, P. M. 2009. "These Lives Will Not Be Lost in Vain: Organizational Learning from Disaster in U. S. Coal Mining", Organization Science (20:5), pp. 861-875.
    • (2009) Organization Science , vol.20 , Issue.5 , pp. 861-875
    • Madsen, P.M.1
  • 53
    • 77954022932 scopus 로고    scopus 로고
    • Failing to learn? The effects of failure and success on organizational learning in the global orbital launch vehicle industry
    • Madsen, P. M., and Desai, V. 2010. "Failing to Learn? The Effects of Failure and Success on Organizational Learning in the Global Orbital Launch Vehicle Industry", Academy of Management Journal (53:3), pp. 451-476.
    • (2010) Academy of Management Journal , vol.53 , Issue.3 , pp. 451-476
    • Madsen, P.M.1    Desai, V.2
  • 54
    • 77957096376 scopus 로고    scopus 로고
    • Moving toward black hat research in information systems security: An editorial introduction to the special issue
    • Mahmood, M. A., Siponen, M., Straub, D., Rao, H. R., and Raghu, T. S. 2010. "Moving toward Black Hat Research in Information Systems Security: An Editorial Introduction to the Special Issue", MIS Quarterly (34:3), pp. 431-433.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 431-433
    • Mahmood, M.A.1    Siponen, M.2    Straub, D.3    Rao, H.R.4    Raghu, T.S.5
  • 55
    • 0001812752 scopus 로고
    • Exploration and exploitation in organizational learning
    • March, J. G. 1991. "Exploration and Exploitation in Organizational Learning", Organization Science (2:1), pp. 71-87.
    • (1991) Organization Science , vol.2 , Issue.1 , pp. 71-87
    • March, J.G.1
  • 57
    • 84902015866 scopus 로고    scopus 로고
    • Defying experts, rogue computer code still lurks
    • Technology Section, August 26
    • Markoff, J. 2009a. "Defying Experts, Rogue Computer Code Still Lurks", The New York Times, Technology Section, August 26 (http://www.nytimes.com/2009/08/27/technology/27compute.html).
    • (2009) The New York Times
    • Markoff, J.1
  • 58
    • 84944960501 scopus 로고    scopus 로고
    • Malicious software is revised
    • Technology Section, April 9
    • Markoff, J. 2009b. "Malicious Software Is Revised", The New York Times, Technology Section, April 9 (http://www.nytimes.com/2009/04/10/technology/10virus.html).
    • (2009) The New York Times
    • Markoff, J.1
  • 59
    • 37049185921 scopus 로고
    • Early data: Losing our memory?
    • Marshall, E. 1989. "Early Data: Losing Our Memory?", Science (244:4910), p. 1250.
    • (1989) Science , vol.244 , Issue.4910 , pp. 1250
    • Marshall, E.1
  • 60
    • 84944960502 scopus 로고    scopus 로고
    • Conficker wakes up, updates via p2p, drops payload
    • April 8
    • Mills, E. 2009. "Conficker Wakes Up, Updates Via P2P, Drops Payload", CNET, April 8 (http://news.cnet.com/8301-1009-3-10215678-83.html).
    • (2009) CNET
    • Mills, E.1
  • 61
    • 84944960503 scopus 로고    scopus 로고
    • South Korean web sites under renewed attack
    • July 8
    • NBC News. 2009. "South Korean Web Sites under Renewed Attack", NBCNEWS.com, July 8 (http://www.nbcnews.com/id/31825511/ns/technology-and-science-security/t/south-koreanweb-sites-under-renewed-attack/).
    • (2009) NBCNEWS.com
    • NBC News1
  • 62
    • 84865099412 scopus 로고    scopus 로고
    • Learning curves of agents with diverse skills in information technology-enabled physician referral systems
    • Mukhopadhyay, T., Singh, P. V., and Kim, S. H. 2011. "Learning Curves of Agents with Diverse Skills in Information Technology-Enabled Physician Referral Systems", Information Systems Research (22:3), pp. 586-605.
    • (2011) Information Systems Research , vol.22 , Issue.3 , pp. 586-605
    • Mukhopadhyay, T.1    Singh, P.V.2    Kim, S.H.3
  • 63
    • 84944960504 scopus 로고    scopus 로고
    • Antivirus research and detection techniques
    • July 1
    • Munro, J. 2002. "Antivirus Research and Detection Techniques", Extreme Tech, July 1 (http://www.extremetech.com/computing/51498-antivirus-research-and-detection-techniques).
    • (2002) Extreme Tech
    • Munro, J.1
  • 64
    • 73249129677 scopus 로고    scopus 로고
    • A matter of balance: Specialization, task variety, and individual learning in a software maintenance environment
    • Narayanan, S., Balasubramanian, S., and Swaminathan, J. M. 2009. "A Matter of Balance: Specialization, Task Variety, and Individual Learning in a Software Maintenance Environment", Management Science (55:11), pp. 1861-1876
    • (2009) Management Science , vol.55 , Issue.11 , pp. 1861-1876
    • Narayanan, S.1    Balasubramanian, S.2    Swaminathan, J.M.3
  • 65
    • 40949158432 scopus 로고    scopus 로고
    • An undirected attack against critical infrastructure: A case study for improving your control system security
    • Nash, T. 2005. "An Undirected Attack against Critical Infrastructure: A Case Study for Improving Your Control System Security" US-CERT Control Systems Security Center Case Study Series: Vol. 1.2 (http://ics-cert.us-cert.gov/sites/default/files/documents/CaseStudy-002.pdf).
    • (2005) US-CERT Control Systems Security Center Case Study Series: Vol. 1.2
    • Nash, T.1
  • 66
    • 84944960505 scopus 로고    scopus 로고
    • Downadup virus exposes millions of pcs to hijack
    • January 16
    • Neild, B. 2009. "Downadup Virus Exposes Millions of PCs to Hijack", CNN.com/Technology, January 16 (http://edition. cnn.com/2009/TECH/ptech/01/16/virus.downadup/?iref= mpstoryview).
    • (2009) CNN.com/Technology
    • Neild, B.1
  • 67
    • 33846588487 scopus 로고    scopus 로고
    • To disclose or not? An analysis of software user behavior
    • Nizovtsev, D., and Thursby, M. 2007. "To Disclose or Not? An Analysis of Software User Behavior", Information Economics and Policy (19:1), pp. 43-64.
    • (2007) Information Economics and Policy , vol.19 , Issue.1 , pp. 43-64
    • Nizovtsev, D.1    Thursby, M.2
  • 68
    • 0035381974 scopus 로고    scopus 로고
    • Organizational differences in rates of learning: Evidence from the adoption of minimally invasive cardiac surgery
    • Pisano, G. P., Bohmer, R. M. J., and Edmondson, A. C. 2001. "Organizational Differences in Rates of Learning: Evidence from the Adoption of Minimally Invasive Cardiac Surgery", Management Science (47:6), pp. 752-768.
    • (2001) Management Science , vol.47 , Issue.6 , pp. 752-768
    • Pisano, G.P.1    Bohmer, R.M.J.2    Edmondson, A.C.3
  • 69
    • 63349088117 scopus 로고    scopus 로고
    • The deterrent and displacement effects of information security enforcement: International evidence
    • Png, I. P. L., Wang, C. Y., and Wang, Q. H. 2008. "The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence", Journal of Management Information Systems (25:2), pp. 125-144.
    • (2008) Journal of Management Information Systems , vol.25 , Issue.2 , pp. 125-144
    • Png, I.P.L.1    Wang, C.Y.2    Wang, Q.H.3
  • 70
    • 84944960506 scopus 로고    scopus 로고
    • Top 10 tech scares of the decade
    • Purewal, S. J. 2011. "Top 10 Tech Scares of the Decade", PCWorld (http://www.pcworld.com/article/214403/top-10-tech-scares-of-the-decade.html).
    • (2011) PCWorld
    • Purewal, S.J.1
  • 71
    • 33747156640 scopus 로고    scopus 로고
    • Changing the paradigm of software engineering
    • Rajilch, V. 2006. "Changing the Paradigm of Software Engineering", Communications of the ACM (49:8), pp. 67-70.
    • (2006) Communications of the ACM , vol.49 , Issue.8 , pp. 67-70
    • Rajilch, V.1
  • 72
    • 67649548424 scopus 로고    scopus 로고
    • Choice and chance: A conceptual model of paths to information security compromise
    • Ransbotham, S., and Mitra, S. 2009. "Choice and Chance: A Conceptual Model of Paths to Information Security Compromise", Information Systems Research (20:1), pp. 121-139.
    • (2009) Information Systems Research , vol.20 , Issue.1 , pp. 121-139
    • Ransbotham, S.1    Mitra, S.2
  • 73
    • 84884138082 scopus 로고    scopus 로고
    • Are markets for vulnerabilities effective?
    • Ransbotham, S., Mitra, S., and Ramsey, J. 2012. "Are Markets for Vulnerabilities Effective?", MIS Quarterly (36:1), pp. 43-64.
    • (2012) MIS Quarterly , vol.36 , Issue.1 , pp. 43-64
    • Ransbotham, S.1    Mitra, S.2    Ramsey, J.3
  • 75
    • 0037281745 scopus 로고    scopus 로고
    • Learning by doing something else: Variation, relatedness, and the learning curve
    • Schilling, M. A., Vidal, P., Ployhart, R. E., and Marangoni, A. 2003. "Learning by Doing Something Else: Variation, Relatedness, and the Learning Curve", Management Science (49:1), pp. 39-56.
    • (2003) Management Science , vol.49 , Issue.1 , pp. 39-56
    • Schilling, M.A.1    Vidal, P.2    Ployhart, R.E.3    Marangoni, A.4
  • 76
    • 33750595181 scopus 로고
    • A schema theory of discrete motor skill learning
    • Schmidt, R. A. 1975. "A Schema Theory of Discrete Motor Skill Learning", Psychological Review (82:4), pp. 225-260.
    • (1975) Psychological Review , vol.82 , Issue.4 , pp. 225-260
    • Schmidt, R.A.1
  • 77
    • 84944960507 scopus 로고    scopus 로고
    • Advanced malware and targeted attacks evade traditional defences and leave enterprises vulnerable to attack
    • August 31
    • SCMagazine. 2011. "Advanced Malware and Targeted Attacks Evade Traditional Defences and Leave Enterprises Vulnerable to Attack", SC Magazine, August 31 (http://www.scmagazineuk.com/advanced-malware-and-targeted-attacks-evade-traditionaldefences-and-leave-enterprises-vulnerable-to-attack/article/210924/).
    • (2011) SC Magazine
    • SCMagazine1
  • 79
    • 84938068880 scopus 로고    scopus 로고
    • An analysis of information security management strategies in the presence of interdependent security risk
    • Shim, W. H. 2012. "An Analysis of Information Security Management Strategies in the Presence of Interdependent Security Risk", Asia Pacific Journal of Information Systems (22:1), pp. 79-101.
    • (2012) Asia Pacific Journal of Information Systems , vol.22 , Issue.1 , pp. 79-101
    • Shim, W.H.1
  • 80
    • 0013112691 scopus 로고
    • Economies of Scale in Theory and Practice
    • Silberston, A. 1972. "Economies of Scale in Theory and Practice", The Economic Journal (82:325), pp. 369-391.
    • (1972) The Economic Journal , vol.82 , Issue.325 , pp. 369-391
    • Silberston, A.1
  • 81
    • 0003587413 scopus 로고
    • Chicago: University of Chicago Press
    • Smith, A. 1776. The Wealth of Nations, Chicago: University of Chicago Press.
    • (1776) The Wealth of Nations
    • Smith, A.1
  • 82
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub, D. W., and Welke, R. J. 1998. "Coping with Systems Risk: Security Planning Models for Management Decision Making", MIS Quarterly (22:4), pp. 441-469.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 84
    • 84874000050 scopus 로고    scopus 로고
    • One internet, many worlds
    • ® Labs (2:1), pp. 3-5.
    • (2008) ® Labs , vol.2 , Issue.1 , pp. 3-5
    • Telafici, J.1
  • 85
    • 34547100991 scopus 로고    scopus 로고
    • An empirical analysis of the impact of software vulnerability announcements on firm stock price
    • Telang, R., and Wattal, S. 2007. "An Empirical Analysis of the Impact of Software Vulnerability Announcements on Firm Stock Price", IEEE Transactions on Software Engineering (33:8), pp. 544-557.
    • (2007) IEEE Transactions on Software Engineering , vol.33 , Issue.8 , pp. 544-557
    • Telang, R.1    Wattal, S.2
  • 86
    • 84860651147 scopus 로고    scopus 로고
    • Patch release behaviors of software vendors in response to vulnerabilities: An empirical analysis
    • Temizkan, O., Kumar. R. L., Park, S., and Subramanian, C. 2012. "Patch Release Behaviors of Software Vendors in Response to Vulnerabilities: An Empirical Analysis", Journal of Management Information Systems (28:4), pp. 305-338.
    • (2012) Journal of Management Information Systems , vol.28 , Issue.4 , pp. 305-338
    • Temizkan, O.1    Kumar, R.L.2    Park, S.3    Subramanian, C.4
  • 87
    • 0009385128 scopus 로고    scopus 로고
    • Learning from experience and learning from others: An exploration of learning and spillovers in wartime shipbuilding
    • Thornton, R. A., and Thompson, P. 2001. "Learning from Experience and Learning from Others: An Exploration of Learning and Spillovers in Wartime Shipbuilding", American Economic Review (91:5), pp. 1350-1368.
    • (2001) American Economic Review , vol.91 , Issue.5 , pp. 1350-1368
    • Thornton, R.A.1    Thompson, P.2
  • 90
    • 0000840199 scopus 로고    scopus 로고
    • The distinctive domain of entrepreneurship research: An editor's perspective
    • Firm Emergence, and Growth Volume 3, J. Katz and R. Brockhaus eds., Greenwich, CT: JAI Press
    • Venkatarman, S. 1997. "The Distinctive Domain of Entrepreneurship Research: An Editor's Perspective", in Advances in Entrepreneurship, Firm Emergence, and Growth (Volume 3), J. Katz and R. Brockhaus (eds.), Greenwich, CT: JAI Press, pp. 119-138.
    • (1997) Advances in Entrepreneurship , pp. 119-138
    • Venkatarman, S.1
  • 91
    • 84944960509 scopus 로고    scopus 로고
    • Antivirus vendors collaborate on spyware fight
    • January 31
    • Vijayan, J. 2006. "Antivirus Vendors Collaborate on Spyware Fight", PCWorld, January 31 (http://www.pcworld.com/article/124564/article.html).
    • (2006) PCWorld
    • Vijayan, J.1
  • 92
    • 84944960510 scopus 로고    scopus 로고
    • Targeted malware attack on foreign correspondents based in China
    • September 28
    • Villeneuve, N., and Walton, G. 2009. "Targeted Malware Attack on Foreign Correspondents Based in China", Infowar Monitor, September 28 (http://www.infowar-monitor.net/2009/09/targetedmalware-attack-on-foreign-correspondents-based-in-china).
    • (2009) Infowar Monitor
    • Villeneuve, N.1    Walton, G.2
  • 93
    • 0032071638 scopus 로고    scopus 로고
    • Economics of product development by users: The impact of "sticky" local information
    • Von Hippel, E. 1998. "Economics of Product Development by Users: The Impact of "Sticky" Local Information", Management Science (44:5), pp. 629-644.
    • (1998) Management Science , vol.44 , Issue.5 , pp. 629-644
    • Von Hippel, E.1
  • 95
    • 38549146488 scopus 로고    scopus 로고
    • Conditions that shape the learning curve: Factors that increase the ability and opportunity to learn
    • Wiersma, E. 2007. "Conditions That Shape the Learning Curve: Factors That Increase the Ability and Opportunity to Learn", Management Science (53:12), pp. 1903-1915.
    • (2007) Management Science , vol.53 , Issue.12 , pp. 1903-1915
    • Wiersma, E.1
  • 96
    • 84944960512 scopus 로고    scopus 로고
    • Spread of slammer worm slows
    • January 27
    • Williams, M., Roberts, P., and Evers, J. 2003. "Spread of Slammer Worm Slows", PCWorld, January 27 (http://www.pcworld.com/article/108996/article.html).
    • (2003) PCWorld
    • Williams, M.1    Roberts, P.2    Evers, J.3
  • 97
    • 84944960513 scopus 로고    scopus 로고
    • Targeted attacks now Using bredolab malware
    • February 17
    • Wood, P. 2010. "Targeted Attacks Now Using Bredolab Malware", Symantec Connect, February 17 (http://www.symantec.com/connect/blogs/targeted-attacks-now-using-bredolab-malware).
    • (2010) Symantec Connect
    • Wood, P.1
  • 98
    • 80052893391 scopus 로고    scopus 로고
    • Responses to adversarial situations and collective intelligence
    • Woolley, A. W. 2011. "Responses to Adversarial Situations and Collective Intelligence", Journal of Organizational Behavior (32:7), pp. 978-983.
    • (2011) Journal of Organizational Behavior , vol.32 , Issue.7 , pp. 978-983
    • Woolley, A.W.1
  • 99
    • 0001250106 scopus 로고
    • Factors affecting the cost of airplanes
    • Wright, T. P. 1936. "Factors Affecting the Cost of Airplanes", Journal of Aeronautical Sciences (3:4), pp. 122-128.
    • (1936) Journal of Aeronautical Sciences , vol.3 , Issue.4 , pp. 122-128
    • Wright, T.P.1
  • 100
    • 84944960514 scopus 로고    scopus 로고
    • Can foreign antivirus match Asian threats?
    • October 30
    • Yeo, V. 2008. "Can Foreign Antivirus Match Asian Threats?", ZDNet, October 30 (http://www.zdnet.com/can-foreign-antivirusmatch-asian-threats-2062047787/).
    • (2008) ZDNet
    • Yeo, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.